Description
The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2001-1122 | The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers. |
References
History
Wed, 28 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T04:44:07.880Z
Reserved: 2002-03-15T00:00:00.000Z
Link: CVE-2001-1141
No data.
Status : Deferred
Published: 2001-07-10T04:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2001-1141
OpenCVE Enrichment
No data.
Weaknesses
EUVD